This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally.
History

Thu, 10 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Atlassian
Atlassian confluence Data Center
Atlassian confluence Server
Atlassian crucible
Atlassian fisheye
Atlassian jira Data Center
Atlassian jira Server
Atlassian jira Service Management
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:lts:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.7.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.8.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:lts:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.7.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.8.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:lts:*:*:*
cpe:2.3:a:atlassian:jira_server:*:*:*:*:lts:*:*:*
cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*
cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*
cpe:2.3:a:atlassian:jira_service_management:5.15.2:*:*:*:server:*:*:*
Vendors & Products Atlassian
Atlassian confluence Data Center
Atlassian confluence Server
Atlassian crucible
Atlassian fisheye
Atlassian jira Data Center
Atlassian jira Server
Atlassian jira Service Management

Fri, 14 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 14 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Description This CVE's publication may have been a false positive or a mistake. As a result, we have rejected this record. This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally.
References

Wed, 01 Jan 2025 00:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:lts:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.7.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.8.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:8.9.0:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:lts:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.7.2:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.8.0:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.8.1:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:8.9.0:*:*:*:*:*:*:*
Vendors & Products Atlassian
Atlassian confluence Data Center
Atlassian confluence Server
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Jan 2025 00:15:00 +0000

Type Values Removed Values Added
Description This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally. This CVE's publication may have been a false positive or a mistake. As a result, we have rejected this record.

cve-icon MITRE

Status: PUBLISHED

Assigner: atlassian

Published: 2024-05-21T23:00:00.446Z

Updated: 2025-03-14T20:55:38.532Z

Reserved: 2024-01-01T00:05:33.846Z

Link: CVE-2024-21683

cve-icon Vulnrichment

Updated: 2024-05-24T14:08:46.801Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2024-05-21T23:15:07.923

Modified: 2025-04-10T19:54:01.040

Link: CVE-2024-21683

cve-icon Redhat

No data.